Traffic indication map

Last updated

Traffic indication map (TIM) is a structure used in 802.11 wireless network management frames.

Contents

The traffic indication map information element is covered under section 7.3.2.6 of 802.11-1999 standard. [1]

The IEEE 802.11 standards use a bitmap to indicate to any sleeping listening stations that the access point (AP) has buffered data waiting for it. Because stations should listen to at least one beacon during the listen interval, the AP periodically sends this bitmap in its beacons as an information element. The bit mask is called the traffic indication map and consists of 2008 bits, each bit representing the association ID (AID) of a station.

However, in most situations an AP only has data for a few stations, so only the portion of the bitmap representing those stations needs to be transmitted.

Because the bitmap is never transmitted in its entirety, it is referred to as a virtual bitmap, and the portion that is actually transmitted is referred to as a partial virtual bitmap.

The structure of the TIM is as follows:

element IDlengthDTIM countDTIM periodbitmap controlpartial virtual bitmap
offsetbroadcast
element ID
(1 octet)
identifies a TIM element
length
(1 octet)
the size of the whole element (5 to 255)
DTIM_count
(1 octet)
the number of beacons remaining before a DTIM (including this frame, so 0 means that this frame is a DTIM)
DTIM_period
(1 octet)
A scaling factor indicating that only every nth beacon includes a TIM. Stations in low-power mode will remain asleep and only wake to listen for those beacons, to determine whether they should also remain awake to receive data frames.
bitmap_control.offset
(7 bits)
bitmap_control.broadcast
(1 bit)
1 when one or more broadcast or multicast frames are queued. This means that all stations should wake up.
partial_virtual_bitmap
(8 to 2008 bits)
This comprises (length-4)×8 bits, each representing a currently-associated station. The low-order bit of the first octet represents station with association ID (bitmap_control.offset×16). Bits outside the partial bitmap are implicitly zero.

[2] [3]

Delivery traffic indication message

A delivery traffic indication message (DTIM) is a kind of TIM which informs the clients about the presence of buffered multicast or broadcast data on the access point. It is generated within the periodic beacon at a frequency specified by the DTIM Interval. Beacons are packets sent by an access point to synchronize a wireless network. Normal TIMs that are present in every beacon are for signaling the presence of buffered unicast data. After a DTIM, the access point will send the buffered multicast and broadcast data on the channel following the normal channel access rules (CSMA/CA). This helps to have minimum collision and, in effect, increased throughput. In cases where there is not much interference, or where the number of clients is limited, the DTIM interval has little or no significance.

802.11 standard

According to the 802.11 standards, a delivery traffic indication message (DTIM) period value is a number that determines how often a beacon frame includes a Delivery Traffic Indication Message, and this number is included in each beacon frame. A DTIM is included in beacon frames, according to the DTIM period, to indicate to the client devices whether the access point has buffered broadcast or multicast data waiting for them. Following a beacon frame that includes a DTIM, the access point will release the buffered broadcast and multicast data, if any exists.

Since beacon frames are sent using the mandatory 802.11 algorithm for carrier-sense multiple access with collision avoidance (CSMA/CA), the access point must wait if a client device is sending a frame when the beacon is to be sent. As a result, the actual time between beacons may be longer than the beacon interval. Client devices that awaken from power-save mode may find that they have to wait longer than expected to receive the next beacon frame. Client devices, however, compensate for this inaccuracy by utilizing the time stamp found within the beacon frame.

The 802.11 standards define a power-save mode for client devices. In power-save mode, a client device may choose to sleep for one or more beacon intervals, waking for beacon frames that include DTIMs. When the DTIM period is 2, a client device in power-save mode will awaken to receive every other beacon frame. Upon entering power-save mode, a client device will transmit a notification to the access point, so that the access point will know how to handle unicast traffic destined for the client device. The client device will begin to sleep according to the DTIM period.

DTIM period

The higher the DTIM period, the longer a client device may sleep and therefore the more power a particular client device may save.

Client devices in wireless networks may have conflicting requirements for power consumption and communication throughput when in power-save mode. For example, laptop computers may require relatively high communication throughput and may have low sensitivity to power consumption. Therefore, a relatively low DTIM period, for example 1, may be suitable for these devices. Pocket devices, however, may require relatively low communication throughput and may be operated by batteries of relatively low capacity. Therefore, a higher DTIM period, for example 8, may be suitable for pocket devices. But some of these have a medium to high communication throughput, while still having small batteries, so would benefit from a medium DTIM period, such as 4.

In the present standards, an access point is able to store only a single DTIM period. Consequently, different client devices in power-save mode will all wake up for the same beacon frames according to the DTIM period. A network manager may need to balance the conflicting requirements for power consumption and communication throughput when in power-save mode of client devices in different wireless networks when configuring the DTIM period of an access point. In the future, an access point that can serve multiple service sets (multiple SSIDs) may have a separate DTIM period for each service set. A network manager may consider the requirements of power consumption and communication throughput of client devices in a particular wireless networks when determining which DTIM period to configure for which service set. A higher DTIM period may increase the potential savings in power consumption but reduce the communication throughput, and vice versa.

Related Research Articles

<span class="mw-page-title-main">IEEE 802.11</span> Wireless network standard

IEEE 802.11 is part of the IEEE 802 set of local area network (LAN) technical standards, and specifies the set of medium access control (MAC) and physical layer (PHY) protocols for implementing wireless local area network (WLAN) computer communication. The standard and amendments provide the basis for wireless network products using the Wi-Fi brand and are the world's most widely used wireless computer networking standards. IEEE 802.11 is used in most home and office networks to allow laptops, printers, smartphones, and other devices to communicate with each other and access the Internet without connecting wires. IEEE 802.11 is also a basis for vehicle-based communication networks with IEEE 802.11p.

IEEE 802.2 is the original name of the ISO/IEC 8802-2 standard which defines logical link control (LLC) as the upper portion of the data link layer of the OSI Model. The original standard developed by the Institute of Electrical and Electronics Engineers (IEEE) in collaboration with the American National Standards Institute (ANSI) was adopted by the International Organization for Standardization (ISO) in 1998, but it remains an integral part of the family of IEEE 802 standards for local and metropolitan networks.

A MAC address is a unique identifier assigned to a network interface controller (NIC) for use as a network address in communications within a network segment. This use is common in most IEEE 802 networking technologies, including Ethernet, Wi-Fi, and Bluetooth. Within the Open Systems Interconnection (OSI) network model, MAC addresses are used in the medium access control protocol sublayer of the data link layer. As typically represented, MAC addresses are recognizable as six groups of two hexadecimal digits, separated by hyphens, colons, or without a separator.

IEEE 802.11e-2005 or 802.11e is an approved amendment to the IEEE 802.11 standard that defines a set of quality of service (QoS) enhancements for wireless LAN applications through modifications to the media access control (MAC) layer. The standard is considered of critical importance for delay-sensitive applications, such as voice over wireless LAN and streaming multimedia. The amendment has been incorporated into the published IEEE 802.11-2007 standard.

<span class="mw-page-title-main">Hidden node problem</span> Problem in wireless networking

In wireless networking, the hidden node problem or hidden terminal problem occurs when a node can communicate with a wireless access point (AP), but cannot directly communicate with other nodes that are communicating with that AP. This leads to difficulties in medium access control sublayer since multiple nodes can send data packets to the AP simultaneously, which creates interference at the AP resulting in no packet getting through.

IEEE 802.15.4 is a technical standard which defines the operation of a low-rate wireless personal area network (LR-WPAN). It specifies the physical layer and media access control for LR-WPANs, and is maintained by the IEEE 802.15 working group, which defined the standard in 2003. It is the basis for the Zigbee, ISA100.11a, WirelessHART, MiWi, 6LoWPAN, Thread, Matter and SNAP specifications, each of which further extends the standard by developing the upper layers which are not defined in IEEE 802.15.4. In particular, 6LoWPAN defines a binding for the IPv6 version of the Internet Protocol (IP) over WPANs, and is itself used by upper layers like Thread.

IEEE 802.11i-2004, or 802.11i for short, is an amendment to the original IEEE 802.11, implemented as Wi-Fi Protected Access II (WPA2). The draft standard was ratified on 24 June 2004. This standard specifies security mechanisms for wireless networks, replacing the short Authentication and privacy clause of the original standard with a detailed Security clause. In the process, the amendment deprecated broken Wired Equivalent Privacy (WEP), while it was later incorporated into the published IEEE 802.11-2007 standard.

A wireless distribution system (WDS) is a system enabling the wireless interconnection of access points in an IEEE 802.11 network. It allows a wireless network to be expanded using multiple access points without the traditional requirement for a wired backbone to link them. The notable advantage of WDS over other solutions is that it preserves the MAC addresses of client frames across links between access points.

Wireless Multimedia Extensions (WME), also known as Wi-Fi Multimedia (WMM), is a Wi-Fi Alliance interoperability certification, based on the IEEE 802.11e standard. It provides basic Quality of service (QoS) features to IEEE 802.11 networks. WMM prioritizes traffic according to four Access Categories (AC): voice (AC_VO), video (AC_VI), best effort (AC_BE), and background (AC_BK). However, it does not provide guaranteed throughput. It is suitable for well-defined applications that require QoS, such as Voice over IP (VoIP) on Wi-Fi phones (VoWLAN).

<span class="mw-page-title-main">Beacon frame</span>

A beacon frame is a type of management frame in IEEE 802.11 WLANs. It contains information about the network. Beacon frames are transmitted periodically; they serve to announce the presence of a wireless LAN and to provide a timing signal to synchronise communications with the devices using the network. In an infrastructurebasic service set (BSS), beacon frames are transmitted by the access point (AP). In ad hoc (IBSS) networks, beacon generation is distributed among the stations. For the 2.4 GHz spectrum, when having more than 15 SSIDs on non-overlapping channels, beacon frames start to consume significant amount of air time and degrade performance even when most of the networks are idle.

Point Coordination Function (PCF) is a media access control (MAC) technique used in IEEE 802.11 based WLANs, including Wi-Fi. It resides in a point coordinator also known as access point (AP), to coordinate the communication within the network. The AP waits for PIFS duration rather than DIFS duration to grasp the channel. PIFS is less than DIFS duration and hence the point coordinator always has the priority to access the channel.

IP multicast is a method of sending Internet Protocol (IP) datagrams to a group of interested receivers in a single transmission. It is the IP-specific form of multicast and is used for streaming media and other network applications. It uses specially reserved multicast address blocks in IPv4 and IPv6.

IEEE 802.11w-2009 is an approved amendment to the IEEE 802.11 standard to increase the security of its management frames.

IEEE 802.11n-2009, or 802.11n, is a wireless-networking standard that uses multiple antennas to increase data rates. The Wi-Fi Alliance has also retroactively labelled the technology for the standard as Wi-Fi 4. It standardized support for multiple-input multiple-output, frame aggregation, and security improvements, among other features, and can be used in the 2.4 GHz or 5 GHz frequency bands.

<span class="mw-page-title-main">Computer network</span> Network that allows computers to share resources and communicate with each other

A computer network is a set of computers sharing resources located on or provided by network nodes. Computers use common communication protocols over digital interconnections to communicate with each other. These interconnections are made up of telecommunication network technologies based on physically wired, optical, and wireless radio-frequency methods that may be arranged in a variety of network topologies.

Frame-bursting is a communication protocol feature used at the link layer in communication networks to alter the transmission characteristics in order to benefit from higher throughput. It is a technique sometimes used in communication protocols for shared mediums to achieve higher throughput by allowing the transmitter to send a series of frames in succession without relinquishing control of the transmission medium. Related techniques used to achieve the same goal include fast frames wherein the inter-frame wait interval is reduced, and jumbo frames wherein the size of the frame is increased. Frame bursting may also benefit from packet aggregation. Communication protocols for shared mediums are designed to relinquish the medium and wait for a while after the transmission of a MAC layer frame in order to facilitate the fair use of the medium by multiple users. Frame bursting may be permissible in certain scenarios such as when the link is point-to-point or when the signal from other users is indistinguishable from noise. Frame bursting allows for more data packets per time interval at the cost of wait time for other users.

In computer networking, an Ethernet frame is a data link layer protocol data unit and uses the underlying Ethernet physical layer transport mechanisms. In other words, a data unit on an Ethernet link transports an Ethernet frame as its payload.

Block acknowledgement (BA) was initially defined in IEEE 802.11e as an optional scheme to improve the MAC efficiency. 802.11n amendment ratified in 2009 enhances this BA mechanism then made it as mandatory to support by all 802.11n-capable devices.

IEEE 802.11ah is a wireless networking protocol published in 2017 called Wi-Fi HaLow as an amendment of the IEEE 802.11-2007 wireless networking standard. It uses 900 MHz license-exempt bands to provide extended-range Wi-Fi networks, compared to conventional Wi-Fi networks operating in the 2.4 GHz, 5 GHz and 6 GHz bands. It also benefits from lower energy consumption, allowing the creation of large groups of stations or sensors that cooperate to share signals, supporting the concept of the Internet of things (IoT). The protocol's low power consumption competes with Bluetooth, LoRa, and Zigbee, and has the added benefit of higher data rates and wider coverage range.

Time-Sensitive Networking (TSN) is a set of standards under development by the Time-Sensitive Networking task group of the IEEE 802.1 working group. The TSN task group was formed in November 2012 by renaming the existing Audio Video Bridging Task Group and continuing its work. The name changed as a result of the extension of the working area of the standardization group. The standards define mechanisms for the time-sensitive transmission of data over deterministic Ethernet networks.

References

  1. "ANSI/IEEE Std 802.11, 1999 Edition (ISO/IEC 8802-11:1999) Local and metropolitan area networks--Specific Requirements--Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications" (PDF). Retrieved 2011-05-31.
  2. Techie (2013-05-05). "Optimizing your WiFi's DTIM Interval".
  3. Rasika Nayanajith (2014-10-13). "CWAP – 802.11 Power Management".

Bibliography